June 30, 2015
Cisco added another major piece to its growing security portfolio with an agreement to acquire cloud security provider OpenDNS.
June 26, 2015
New roundup: Sometimes the least of threats -- such as click fraud -- can end up being the bigger issues -- like ransomware. Plus: U.S. Navy won't let go of XP; U.S./China cyber code of conduct; and more!
April 21, 2015
INTERPOL collaborated with Trend Micro, Microsoft and Kaspersky to take down botnet affecting 770,000 users.
March 27, 2015
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
Botnet Get Started
Bring yourself up to speed with our introductory content
A botnet sinkhole is a target machine used by researchers to gather information about a particular botnet. Sinkholing is the redirection of traffic from its original destination to one specified by the sinkhole owners. The altered destination is known as the sinkhole. (The name is a reference to a physical sinkhole, into which items apparently disappear.) Continue Reading
A peer-to-peer botnet is a decentralized group of malware-compromised machines working together for an attacker’s purpose without their owners’ knowledge. Just as in the traditional botnet, which includes a command-and-control server, the bots are typically infected with a Trojan horse and are often used for sending spam or performing DDoS (distributed denial of service) attacks. Continue Reading
A botnet topology is the network structure by which botnet interconnections are organized. Botnet topologies may be either centralized around a command and control server (C&C server) or decentralized using peer-to-peer (P2P) communication. Continue Reading
Evaluate Botnet Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
A report from NSS Labs details the latest updates to financial malware, with criminal crews focused on hiding communications, localization. Continue Reading
The infections and cyberattacks that botnets are used to launch remain hard-to-detect malware threats that have moved beyond PCs to mobile devices. Continue Reading
Learn to apply best practices and optimize your operations.
Botnets can impact any cloud user, but most are unaware of the security nightmare's existence. Understanding and minimizing the opportunities for attacks can keep you from becoming an unwitting accomplice. Continue Reading
Distributed denial-of-service attacks are increasingly a menace for enterprises. Expert Michael Cobb discusses industry initiatives that can help enterprises reduce the occurrence and power of DDoS attacks. Continue Reading
An updated, 64-bit version of the Zeus malware leverages Tor for C&C. What does this mean for enterprises? Nick Lewis discusses. Continue Reading
Problem Solve Botnet Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Spam can use a process called 'snowshoe' to evade spam filters. Enterprise threats expert Nick Lewis explains how to block snowshoe spam. Continue Reading
Did you know a secure Web gateway can combat Web security issues such as malware, unapproved application use and social media threats? Continue Reading
Nick Lewis offers advice on detecting a particular strand of malware that utilizes a Java backdoor to enable botnet communication. Continue Reading